Professional Documents
Culture Documents
LAC
The QoS Classification, Policing, and Marking on a LAC feature allows service providers to classify packets
based upon the IP type of service (ToS) bits in an embedded IP packet. The classification is used to police
the incoming traffic according to the differentiated services code point (DSCP) value. The purpose of
classifying the packet by examining its encapsulation is to simplify the implementation and configuration
needed for a large number of PPP sessions.
Finding Feature Information, page 1
Prerequisites for QoS Classification Policing and Marking on a LAC, page 2
Restrictions for QoS Classification, Policing, and Marking on a LAC, page 2
Information About QoS Classification Policing and Marking on a LAC, page 2
How to Configure QoS Classification Policing and Marking on a LAC, page 4
Configuration Examples for QoS Classification Policing and Marking on a LAC, page 4
Command Reference, page 9
Additional References, page 9
Feature Information for QoS Classification Policing and Marking on a LAC, page 11
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
1
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
2
The figure below shows the deployment of QoS on PPPoE sessions originating at the client and terminating
at the LNS.
Figure 1: Sample Topology for QoS on PPoE Sessions
Note
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
3
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
Example:
Router# show policy-map session uid 401 output
Step 3
exit
Example:
Router# exit
The following examples show you how to apply QoS policy maps to upstream and downstream user
session traffic to achieve the required Service Level Agreements (SLAs) provided by the service provider.
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
4
LAC Configuration
The following example shows that the interfaces between the client and the LAC are ATM5/0 interfaces.
username xyz@cisco.com password 0 password1
username qos4-72a password 0 password1
username qos4-72b password 0 password1
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
5
aaa new-model
!
!
aaa authentication ppp default local
aaa session-id common
ip cef
vpdn enable
!
vpdn-group 1
accept-dialin
protocol pppoe
virtual-template 1
!
vpdn-group 2
request-dialin
protocol l2tp
domain cisco.com
initiate-to ip 10.10.101.2
local name lac
no l2tp tunnel authentication
ip tos reflect
!
pppoe-forwarding
interface Serial3/6
bandwidth 2015
ip address 10.10.100.1 255.255.255.0
no ip redirects
no ip proxy-arp
load-interval 30
no keepalive
no cdp enable
!
interface ATM5/0
no ip address
no ip redirects
no ip proxy-arp
load-interval 30
no atm ilmi-keepalive
!
interface ATM5/0.1 point-to-point
pvc 0/100
encapsulation aal5snap
pppoe max-sessions 100
protocol ppp Virtual-Template1
protocol pppoe
!
!
interface Virtual-Template1
mtu 1492
no ip address
no peer default ip address
ppp authentication chap
!
LNS Configuration
The following example shows that the interface between the LAC and the LNS is a Serial3/6 interface.
username xyz@cisco.com password 0 password1
username qos4-72b password 0 password1
username qos4-72a password 0 password1
aaa new-model
!
!
aaa authentication ppp default local
aaa session-id common
ip cef
vpdn enable
!
vpdn-group 1
accept-dialin
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
6
protocol any
virtual-template 1
terminate-from hostname lac
local name lns
lcp renegotiation always
no l2tp tunnel authentication
ip tos reflect
!
interface Serial3/6
bandwidth 2015
ip address 10.10.100.1 255.255.255.0
no ip redirects
no ip proxy-arp
no ip mroute-cache
load-interval 30
no keepalive
no cdp enable
!
Identifier
xyz@cisco.com
Last Chg
00:02:06
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
7
Note
The session ID, 401, is obtained from the output of the show sss session command shown in the "Example
Verifying the SSS Session" section on page 7.
Router# show policy-map session uid 401 output
SSS session identifier 401 Service-policy output: downstream-policy
Class-map: customer1234 (match-any)
4464 packets, 249984 bytes
5 minute offered rate 17000 bps, drop rate 0 bps
Match: ip dscp cs1 cs2 cs3 cs4
4464 packets, 249984 bytes
5 minute rate 17000 bps
QoS Set
dscp af11
Packets marked 4464
Class-map: customer56 (match-any)
2232 packets, 124992 bytes
5 minute offered rate 8000 bps, drop rate 0 bps
Match: ip dscp cs5 cs6
2232 packets, 124992 bytes
5 minute rate 8000 bps
police:
cir 20000 bps, bc 10000 bytes
pir 40000 bps, be 10000 bytes
conformed 2232 packets, 124992 bytes; actions:
set-dscp-transmit af21
exceeded 0 packets, 0 bytes; actions:
set-dscp-transmit af22
violated 0 packets, 0 bytes; actions:
set-dscp-transmit af23
conformed 8000 bps, exceed 0 bps, violate 0 bps
Class-map: customer7 (match-any)
1116 packets, 62496 bytes
5 minute offered rate 4000 bps, drop rate 4000 bps
Match: ip dscp cs7
1116 packets, 62496 bytes
5 minute rate 4000 bps
drop
Class-map: class-default (match-any)
1236 packets, 68272 bytes
5 minute offered rate 4000 bps, drop rate 0 bps
Match: any
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
8
This QoS policy map is then applied to the user session as follows:
Router# configure terminal
Router(config)# interface virtual-template1
Router(config-if)# service-policy input upstream-policy
Router(config-if)# end
Note
The session ID, 401, is obtained from the output of the show sss session command in the "Example
Verifying the SSS Session" section on page 7.
Router# show policy-map session uid 401 input
SSS session identifier 401 Service-policy input: upstream-policy
Class-map: class-default (match-any)
1920 packets, 111264 bytes
5 minute offered rate 7000 bps, drop rate 5000 bps
Match: any
police:
cir 8000 bps, bc 1500 bytes
conformed 488 packets, 29452 bytes; actions:
transmit
exceeded 1432 packets, 81812 bytes; actions:
drop
conformed 7000 bps, exceed 5000 bps
Command Reference
The following commands are introduced or modified in the feature or features documented in this module.
For information about these commands, see the Cisco IOS Quality of Service Solutions Command Reference
at http://www.cisco.com/en/US/docs/ios/qos/command/reference/qos_book.html . For information about all
Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup or a
Cisco IOS master commands list.
show policy-map session
Additional References
Related Documents
Related Topic
Document Title
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
9
Related Topic
Document Title
Information about attaching policy maps to interfaces "Applying QoS Features Using the MQC" module
using the Modular Quality of Service (QoS)
Command-Line Interface (CLI) (MQC)
DSCP
Standards
Standard
Title
MIBs
MIB
MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms,
for existing MIBs has not been modified.
Cisco IOS releases, and feature sets, use Cisco MIB
Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFC
Title
No new or modified RFCs are supported, and support -for existing RFCs has not been modified.
Technical Assistance
Description
Link
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
10
Feature Name
Releases
Feature Information
12.3(8)T
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
11
QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 15M&T
12